Beruflich Dokumente
Kultur Dokumente
Synopsis
This Project Titled IP SCANNER is the software application developed for analyzing networks. The project lets us to have all information about network computers. The project is developed using Microsoft Visual Basic .Net 2003 and Microsoft Access 2000 as back end. The .Net Framework version used is 1.1. The project contains options for scanning IP addresses in any range. The IP scanner simply pings each IP address to check if it's alive, then optionally it is resolving its hostname, determines the MAC address, scans ports, etc. The amount of gathered data about each host can be extended. Scanning results can be saved as TXT or HTML page. We can determine the computer name, workgroup name, MAC Address and other port details of the required computer in the network. We can also explore the remote system. The project can scan 'B' (Class B networks (128.0.x.x to 191.255.x.x) have a 16bit network prefix with a 16-bit host number, and are also referred to as /16 networks) or even 'C' (Class C networks (192.0.0.x to 223.255.255.x) require 24 bits to identify the network, leaving 8 to identity the host, and are also referred to as /24 networks) class.
CONTENTS
S. No. 1 TITLE INTRODUCTION
1.1 About the Organization 1.2 Overview of the Project
PAGE No.
SYSTEM ANALYSIS
2.1 Existing System 2.2 Proposed System
SYSTEM REQUIREMENT
3.1 Hardware Configuration 3.2 Software Configuration
4 5
SYSTEM TESTING
6.1 Unit Testing 6.2 Integration Testing 6.3 Validation Testing 6.4 Acceptance Testing
8 9 10 11
1. IP Address Details
The module contains options for adding IP Address to the table. We enter the IP Address by selecting values cell by cell. We can also type the Website name to obtain the IP Address and thereby add it to the table. We can view all the IP Addresses added.
3. Port Scanning
The module contains options for scanning local as well as remote system port whether the port is in use or free.
5. User Management
The module contains options for creating users who can logging to this application and change the password.
PROJECT DESCRIPTION
This project has following modules
IP address
a. Add IP address b. Delete IP Address
Show
c. Computer Name d. Group Name e. MAC address f. Time To Live g. Ping h. Trace Route i. Listen Local ports j. Listen Remove ports
View
k. IP address List.
Connect
l. FTP m. HTTP
Settings
n. Change password
User
o. Create user p. Change password
Exit
IP Address
a. Add IP Address
It is used to update the new IP address and allows editing and clearing the IP Address.
b.
Delete IP Address
It is used to delete the existing IP address.
Show
c. Computer Name
It is used to give the computer, Workgroup Name and MAC Address depends upon the IP address.
d. e.
Group Name
It is used to display the group name of the computers.
View
f. IP Address List
It is used to view the IP Address, computer Name, Work Group Name and its MAC address.
Connect
g. FTP
Its acronym is File Transfer Protocol; it is used to enable the FTP connectivity for the required IP address.
h.
HTTP
Its acronym is Hyper Text Transfer Protocol; it is used to enable the HTTP
Settings
i. Change password
It is used to change the password of the existing one.
About
It gives the details of the software.
Users
j. k. Create User
It is used to create the new user, for this it should have name and its password.
Change password
It is used to change the user password.
Exit
It is used to exiting from the application.
2. SYSTEM ANALYSIS
2.1 EXISTING SYSTEM
The Existing system is working under command mode in the disk operating system for getting the data from the other nodes in the networks like ping, route, etc., for accessing every information the user wants to have in the disk operating system and access the information by type in keyboard in DOS mode. External command program directly executable by the operating system.
3. SYSTEM REQUIREMENT
HARDWARE AND SOFTWARE CONFIGURATION
3.1 HARDWARE SPECIFICATION
The hardware used for the development of the project is: Processor Hard Disk Capacity RAM Monitor Keyboard Mouse : Pentium III 866 MHz : 40 GB : 128 MB : 15 Color : 102 keys : 3 buttons
SOFTWARE DESCRIPTION
THE .NET FRAMEWORK
The .NET Framework is a new computing platform that simplifies application development in the highly distributed environment of the Internet.
SECURITY
The runtime enforces code access security. The security features of the runtime thus enable legitimate Internet-deployed software to be exceptionally feature rich. With regards to security, managed components are awarded varying degrees of trust, depending on a number of factors that include their origin to perform file-access operations, registry-access operations, or other sensitive functions.
ROBUSTNESS
The runtime also enforces code robustness by implementing a strict type- and code-verification infrastructure called the common type system(CTS). The CTS ensures that all managed code is self-describing. The managed environment of the runtime eliminates many common software issues.
PRODUCTIVITY
The runtime also accelerates developer productivity. For example, programmers can write applications in their development language of choice, yet take full advantage of the runtime, the class library, and components written in other languages by other developers.
PERFORMANCE
The runtime is designed to enhance performance. Although the common language runtime provides many standard runtime services, managed code is never interpreted. A feature called just-in-time (JIT) compiling enables all managed code to run in the native machine language of the system on which it is executing. Finally, the runtime can be hosted by high-performance, server-side applications, such as Microsoft SQL Server and Internet Information Services (IIS).
INTEROPERABILITY
ADO.NET applications can take advantage of the flexibility and broad acceptance of XML. Because XML is the format for transmitting datasets across the network, any component that can read the XML format can process data. The receiving component need not be an ADO.NET component. The transmitting component can simply transmit the dataset to its destination without regard to how the receiving component is implemented. The destination component might be a Visual Studio application or any other application implemented with any tool whatsoever. The only requirement is that the receiving component be able to read XML. SO, XML was designed with exactly this kind of interoperability in mind.
MAINTAINABILITY
In the life of a deployed system, modest changes are possible, but substantial, Architectural changes are rarely attempted because they are so difficult. As the performance load on a deployed application server grows, system resources can become scarce and response time or throughput can suffer. Faced with this problem, software architects can choose to divide the server's business-logic processing and user-interface processing onto separate tiers on separate machines. In effect, the application server tier is replaced with two tiers, alleviating the shortage of system resources. If the original application is implemented in ADO.NET using datasets, this transformation is made easier. ADO.NET data components in Visual Studio encapsulate data access functionality in various ways that help you program more quickly and with fewer mistakes.
PERFORMANCE
ADO.NET datasets offer performance advantages over ADO disconnected record sets. In ADO.NET data-type conversion is not necessary.
SCALABILITY
ADO.NET accommodates scalability by encouraging programmers to conserve limited resources. Any ADO.NET application employs disconnected access to data; it does not retain database locks or active database connections for long durations.
IMPLEMENTATION
Visual Basic.NET supports implementation inheritance. This means that, while creating applications in Visual Basic.NET, we can drive from another class, which is know as the base class that derived class inherits all the methods and properties of the base class. In the derived class, we can either use the existing code of the base class or override the existing code. Therefore, with help of the implementation inheritance, code can be reused.
GARBAGE COLLECTION
Garbage Collection is another new feature in Visual Basic.NET. The .NET Framework monitors allocated resources, such as objects and variables. In addition, the .NET Framework automatically releases memory for reuse by destroying objects that are no longer in use. In Visual Basic.NET, the garbage collector checks for the objects that are not currently in use by applications. When the garbage collector comes across an object that is marked for garbage collection, it releases the memory occupied by the object.
OVERLOADING
Overloading is another feature in Visual Basic.NET. Overloading enables us to define multiple procedures with the same name, where each procedure has a different set of arguments. Besides using overloading for procedures, we can use it for constructors and properties in a class.
MULTITHREADING
Visual Basic.NET also supports multithreading. An application that supports multithreading can handle multiple tasks simultaneously, we can use multithreading to decrease the time taken by an application to respond to user interaction. To decrease the time taken by an application to respond to user interaction, we must ensure that a separate thread in the application handles user interaction.
MS -ACCESS 2000
It is a personal computer based RDBMS. This provides most of the features available in the high-end RDBMS products like Oracle, Sybase, Ingress etc. VB keeps access as its native database. Developer can create a database for development & further can create. The tables are required to store data. During the initial Development phase data can be stored in the access database & during the implementation phase depending on the volume data can use a higher end database. Office Access, previously known as Microsoft Access, is an active secure database embedded in a virtual object-oriented work cluster. It is a member of the 2007 Microsoft Office system. Access can use data stored in Access/Jet, Microsoft SQL Server, Oracle, or any ODBC-compliant data container. Skilled software developers and data architects use it to develop application software. Relatively unskilled programmers and nonprogrammer "power users" can use it to build simple applications. It supports some object-oriented (OO) techniques but falls short of being a fully OO development tool. Access was also the name of a communications program from Microsoft, meant to compete with ProComm and other programs. This Access proved a failure and was dropped. Years later Microsoft reused the name for its database software.
4. FEASIBILITY STUDY
The feasibility of the project is analyzed in this phase and business proposal is put forth with a very general plan for the project and some cost estimates. During system analysis the feasibility study of the proposed system is to be carried out. This is to ensure that the proposed system is not a burden to the company. For feasibility analysis, some understanding of the major requirements for the system is essential. Three key considerations involved in the feasibility analysis are Economical Feasibility Technical Feasibility Social Feasibility
I. ECONOMICAL FEASIBILITY
This study is carried out to check the economic impact that the system will have on the organization. The amount of fund that the company can spend into the research and development of the system is limited. The expenditures must be justified. Thus the developed system as well within the budget and this was achieved because most of the technologies used are freely available. Only the customized products had to be purchased.
5. SYSTEM DESIGN
The design of the system is essentially a blue print, or plan for a solution of the system to be developed. A part of the system or subsystem of a whole of the system can itself be considered a system with its own complements. Here the focus is on detecting that which is all the modules method needed for the system, the specification of these design is the only way by which we can accurately translate the end-user requirements in to a finished software product or system. The data flow oriented design in an architectural design method that allows a convenient transition from the analysis model to a design description of program structure the DFD presents a system overview depicting its overall purpose an its interactions with external objects it provides a general pictorial of data transformations in the system. A DFD shows the flow of data through a system which may be a manual procedure software system, a hard ware system or any combination of these. A DFD shows the movements of the data through the different transformations, which are the process in the system. DFD are made up of a number of symbols, which represent system components, process, data store, and data flow and external entities.
System analysis decide the following input design details like, what data to input, what medium to use, hoe the data should be arranged or coded, data items and transactions needing validations to detect errors and at last the dialogue to guide user in providing input. Input data of a system may not be necessarily be raw data captured in the system from scratch. These can also be the output of another system or sub system. The design of input covers all phases of input from the creation of initial data to actual entering the data to the system for processing. The design of inputs involves identifying the data needed, specifying the characteristics of each data item, capturing and preparing data for computer processing and ensuring correctness of data.
Data Integration
In a database, information from several files are coordinated, accessed and operated upon as through it is in a single file. Logically, the information are centralized, physically, the data may be located on different devices, connected through data communication facilities.
Data Integrity
Data integrity means storing all data in one place only and how each application to access it. This approach results in more consistent information, one update being sufficient to achieve a new record status for all applications, which use it. This leads to less data redundancy; data items need not be duplicated; a reduction in the direct access storage requirement.
Data Independence
Data independence is the insulation of application programs from changing aspects of physical data organization. This objective seeks to allow changes in the content and organization of physical data without reprogramming of applications and to allow modifications to application programs without reorganizing the physical data. The tables needed for each module were designed and the specification of each and every column was given based on the records and details collected during record specification of the system study.
TABLE DESIGN
Table: Nodes Primary Key : IP Address Field Name S. No IP Address Computer Name Workgroup Name MAC Address Type Number Text Text Text Text Size 4 15 255 255 20
Table: Users
Size 15 15
External outputs are those whose destination will be outside the organization and which require special attention as they project the image of the organization. Internal outputs are those whose destination is within the organization. it is to be carefully designed as they are the users main interface with the system.
IP S C A N N E R
IP A D D R E S S A D D IP A D D R ESS
SH O W
V IE W
CONNEC T
S E T T IN G S
ABOUT
U SER
E X IT
SYSTEM FL OW DIAGRAM
CO PUTER NAM E
IP A D D R E S S L IS T
FTP
CHANGE PA SSW O R D
CREATE U SER
D E L E T E IP A D D R ESS
GROUP NAM E
M A C A D D R E SS
T IM E T O L IV E
P IN G
TRAC E ROUTE
L IS T E N L O C A L P O R T S
L IS T E N R E M O V E P O R T S
Level - 0
Level - 1
IP ADDRESS
Coding
Coding is the process of whereby the physical design specifications created by the analysis team turned into working computer code by the programming team.
Testing
Once the coding process is begin and proceed in parallel, as each program module can be tested.
Installation
Installation is the process during which the current system is replaced by the new system. This includes conversion of existing data, software, and documentation and work procedures to those consistent with the new system.
Documentation
It is result from the installation process, user guides provides the information of how the use the system and its flow.
7.2 MAINTENANCE
After development of the software, Maintenance of software is important aspect. Maintainability is the ease with which software can be understood and corrected, adapted and enhanced. The goal is to improve the ease with which changes can be accommodated and reduce the amount of effort expanded on maintenance. Software maintenance is one of the phases in, and follows deployment of the software into the field. The software maintenance phase involves changes to the software in order to correct defects and deficiencies found during field usage as well as the addition of new functionality to improve the software's and applicability. Maintenance can be classified as, Corrective Adaptive Perfective.
CORRECTIVE MAINTENANCE
Corrective maintenance means repairing processing or performance failures or making changes because of previously uncorrected problems of false assumptions. In this project, the existing system cant control the task manger with maximum duration of the time, now it is over come with user time consumption.
PERFECTIVE MAINTENANCE
Perfective maintenance means enhancing performance or modifying the programs to respond to the users additional or changing needs. In this project, various links are available instead of menus are available so it successfully interactive with the user.
ADAPTIVE MAINTENANCE
Adaptive maintenance means changing the program function. Of these types more time and money are spent on perfective than on corrective and adaptive maintenance together. This project should be inter-operability with Hardware devices and also interact with the other softwares.
8. CONCLUSION
It is believed that almost all the system objectives that have been planned at the commencement of the software development have been net with and the implementation process of the project is completed. A trial run of the system has been made and is giving good results the procedures for processing is simple and regular order. The process of preparing plans had been a new experience, which was found use full in later phases of the project is completed. Efforts have been taken to make the system user friendly and as simple as possible. However at some points some features may have been missed out which might be considered for further modification of the application
10. BIBLIOGRAPHY
1) 2) 3) 4) 5)
. NET developers guide 2002- Prentice-Hall India.- Grey Buczek, VB.NET by example 2003 TataMcGraw-Hill- Benolt Marchal, System Analysis & Design Alenis Leon. An Integral approach to software engineering Pankaj Jalole. Microsoft Visual Basic.NET Programmers Cookbook(TataMcGraw-Hill Edition)-MATTHEW MACDONALD
6)
Jittery R.Shapiro, The Complete Reference Visual Basic .NET Edition 2002, Tata McGraw-Hill, Publishing Company Limited, New Delhi.
WEBSITES
1. http://www.microsoft.com/dotnet/visual basic http://www.dotnetheaven.com